<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/"
>

<channel>
	<title>Curve Finance hack Archives - Coin Engineer</title>
	<atom:link href="https://coinengineer.net/blog/tag/curve-finance-hack/feed/" rel="self" type="application/rss+xml" />
	<link>https://coinengineer.net/blog/tag/curve-finance-hack/</link>
	<description>Btc, Coins, Pre-Sale, DeFi, NFT</description>
	<lastBuildDate>Wed, 01 May 2024 12:38:45 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://coinengineer.net/blog/wp-content/uploads/2024/04/cropped-Coin-Engineer-Logo-Favicon-2-32x32.png</url>
	<title>Curve Finance hack Archives - Coin Engineer</title>
	<link>https://coinengineer.net/blog/tag/curve-finance-hack/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Curve Finance Awarded a Security Researcher</title>
		<link>https://coinengineer.net/blog/curve-finance-awarded-a-security-researcher/</link>
					<comments>https://coinengineer.net/blog/curve-finance-awarded-a-security-researcher/#respond</comments>
		
		<dc:creator><![CDATA[Tanju Akbıyık]]></dc:creator>
		<pubDate>Wed, 01 May 2024 14:00:28 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Curve Finance]]></category>
		<category><![CDATA[Curve Finance hack]]></category>
		<category><![CDATA[curve finance security]]></category>
		<category><![CDATA[curve finance vulnerability]]></category>
		<guid isPermaLink="false">https://coinengineer.io/?p=19323</guid>

					<description><![CDATA[<p>Curve Finance awarded the maximum bug bounty of $250,000 to cybersecurity researcher Marco Croc after thoroughly investigating the vulnerability. A security researcher has been rewarded $250,000 for discovering a vulnerability that has allowed hackers to siphon millions of dollars from crypto protocols in the past. Pseudonymous cybersecurity researcher Marco Croc of Kupia Security has identified</p>
<p>The post <a href="https://coinengineer.net/blog/curve-finance-awarded-a-security-researcher/">Curve Finance Awarded a Security Researcher</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>Curve Finance</strong> awarded the maximum bug bounty of $250,000 to cybersecurity researcher Marco Croc after thoroughly investigating the vulnerability. A security researcher has been rewarded $250,000 for discovering a vulnerability that has allowed hackers to siphon millions of dollars from crypto protocols in the past.</p>
<p>Pseudonymous cybersecurity researcher Marco Croc of Kupia Security has identified a reentrant vulnerability in decentralized finance (DeFi) protocol Curve Finance. In an X thread, he explained how the bug could be exploited to manipulate balances and withdraw funds from liquidity pools.</p>
<p>Marco Croc explained that <a href="https://coinengineer.net/blog/curve-finance-proposes-amm-fee-increase-for-llamma-liquidity-pool/">Curve Finance</a> acknowledges potential vulnerabilities and “recognizes the severity of the vulnerability.” After a thorough investigation, Curve Finance awarded Marco Croc the maximum error award of $250,000.</p>
<p>According to <a href="https://coinengineer.net/blog/curve-finance-and-zetachain-cross-chain-bitcoin-integration/">Curve Finance</a>, the threat was not classified as &#8220;very dangerous&#8221; and they believed that they would be able to recover the stolen funds in such a situation. However, the protocol noted that a security incident of any scale &#8220;might have created serious panic.&#8221;</p>
<p>Curve Finance survived a $62 million hack in July. As part of returning to normalcy, the DeFi protocol voted to compensate liquidity providers (LPs) worth $49.2 million in assets.</p>
<p>On-chain data confirms that 94% of token holders have approved the distribution of over $49.2 million worth of tokens to cover losses of Curve, JPEG&#8217;d (JPEG), Alchemix (ALCX), and Metronome (MET) pools.</p>
<p>According to Curve&#8217;s proposal, the community fund will provide Curve DAO (CRV) tokens. The final amount includes a deduction for tokens recovered since the incident.</p>
<p>“In total, the recovery of ETH 2,887 was calculated to be 5919.2226 ETH, the CRV to be recovered was calculated to be 34,733,171.51 CRV, and the total to be distributed was calculated to be 55,544,782.73 CRV,” the proposal states.</p>
<p>The attacker exploited a vulnerability in stable repositories using some versions of the Vyper programming language. The bug made Vyper versions 0.2.15, 0.2.16 and 0.3.0 vulnerable to reentrant attacks.</p>
<hr />
<p><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="noreferrer noopener"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="noreferrer noopener"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers"><strong>Twitter</strong></a> channels for the latest news and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/curve-finance-awarded-a-security-researcher/">Curve Finance Awarded a Security Researcher</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/curve-finance-awarded-a-security-researcher/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2023/12/tempory-30.png' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2023/12/tempory-30.png' width='58' height='33' /></media:content>	</item>
		<item>
		<title>Zunami Protocol Hit by $2.1 Million Price Manipulation Hack!</title>
		<link>https://coinengineer.net/blog/zunami-protocol-hit-by-2-1-million-price-manipulation-hack/</link>
					<comments>https://coinengineer.net/blog/zunami-protocol-hit-by-2-1-million-price-manipulation-hack/#respond</comments>
		
		<dc:creator><![CDATA[Yunus Taşlı]]></dc:creator>
		<pubDate>Mon, 14 Aug 2023 08:54:56 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Curve Finance]]></category>
		<category><![CDATA[Curve Finance hack]]></category>
		<category><![CDATA[DeFi]]></category>
		<category><![CDATA[defi hack]]></category>
		<category><![CDATA[hack attack]]></category>
		<category><![CDATA[tornado cash]]></category>
		<category><![CDATA[zunami protocol]]></category>
		<category><![CDATA[zunami protocol hack]]></category>
		<category><![CDATA[zunami protocol hack attack]]></category>
		<guid isPermaLink="false">https://coinengineer.io/blog/?p=3048</guid>

					<description><![CDATA[<p>One of the most common incidents these days is hacking attacks. Just a few days after the Curve attack, there was news of an hack attack from Zunami Protocol. Although not as severe as the Curve attack, Zunami users are currently in a state of considerable uncertainty. According to the security firm PeckShield, the DeFi</p>
<p>The post <a href="https://coinengineer.net/blog/zunami-protocol-hit-by-2-1-million-price-manipulation-hack/">Zunami Protocol Hit by $2.1 Million Price Manipulation Hack!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>One of the most common incidents these days is <strong>hacking attacks</strong>. Just a few days after the Curve attack, there was news of an hack attack from Zunami Protocol. Although not as severe as the <strong>Curve</strong> attack, Zunami users are currently in a state of considerable uncertainty.</p>
<p>According to the security firm<strong> PeckShield</strong>, the DeFi yield aggregator Zunami Protocol has suffered an hack attack that will result in losses exceeding <strong>$2.1 million</strong>.</p>
<p>On Monday morning, PeckShield disclosed an assault involving two big transactions. PeckShield reported that the hacking of funds from Zunami Protocol occurred through the mixing service <strong>Tornado Cash</strong>.</p>
<p>Following PeckShield&#8217;s warning, the Protocol stated, &#8220;zStables seems to have faced an attack.&#8221;&#8216; However, they added that the collateral is safe and the team has started investigating.</p>
<blockquote><p>You might like: <a href="https://coinengineer.net/blog/polygon-based-y00ts-nfts-to-move-to-ethereum-2/"><strong>Polygon-based Y00TS NFTs to Move to Ethereum</strong></a></p></blockquote>
<h2>Zunami Protocol Price Manipulation Attack</h2>
<p>In a tweet, the security company pointed out that the Zunami Protocol hack exploited a price manipulation issue, which could be further leveraged through donations to inaccurately calculate the price.</p>
<p><strong>Xian Yu</strong>, the founder of <strong>SlowMist</strong>, said today that their firm detected the security vulnerability two months ago. This project fell victim to price manipulation attacks, suffering losses exceeding $2.1 million. Yu, also known as Cos, emphasized, &#8220;What&#8217;s crucial is our system identifying this risk two months ago and them informing us proactively.&#8221;</p>
<hr />
<p>You can share your opinions in the comments about the topic. Also, follow us on <a href="https://t.me/coinengineernews" target="_blank" rel="noreferrer noopener"><strong>Telegram</strong></a>, <a href="https://twitter.com/coinengineers" target="_blank" rel="noreferrer noopener"><strong>Twitter</strong></a>, and <strong><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="noreferrer noopener">YouTube</a></strong> for more content like this.</p>
<p>The post <a href="https://coinengineer.net/blog/zunami-protocol-hit-by-2-1-million-price-manipulation-hack/">Zunami Protocol Hit by $2.1 Million Price Manipulation Hack!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/zunami-protocol-hit-by-2-1-million-price-manipulation-hack/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2023/08/Zunami-Protocol-Hit-by-2.1-Million-Price-Manipulation-Hack.jpg' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2023/08/Zunami-Protocol-Hit-by-2.1-Million-Price-Manipulation-Hack.jpg' width='58' height='33' /></media:content>	</item>
		<item>
		<title>Curve Finance (CRV) was exploited. Hackers stole over $47M.</title>
		<link>https://coinengineer.net/blog/curve-finance-was-exploited-hackers-steal-over-47m/</link>
					<comments>https://coinengineer.net/blog/curve-finance-was-exploited-hackers-steal-over-47m/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 31 Jul 2023 00:40:36 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Aave]]></category>
		<category><![CDATA[Convex Finance]]></category>
		<category><![CDATA[Curve Finance]]></category>
		<category><![CDATA[Curve Finance depegged]]></category>
		<category><![CDATA[Curve Finance exploited]]></category>
		<category><![CDATA[Curve Finance hack]]></category>
		<category><![CDATA[Curve Finance price]]></category>
		<category><![CDATA[Curve Finance weth pools]]></category>
		<category><![CDATA[DeFi]]></category>
		<category><![CDATA[Vyper]]></category>
		<guid isPermaLink="false">https://coinengineer.io/blog/?p=2664</guid>

					<description><![CDATA[<p>Curve Finance which is one of DeFi platforms was attacked by hackers. The assets worth $24M were stolen. Here are the details. Today, Attackers have exploited Curve Finance pools. This situation happened due to Vyper compiler had an error caused by 0.2.16, 0.2.15, and 0.3.0 versions. Furthermore, in this attack, the hackers stole 32M CRV</p>
<p>The post <a href="https://coinengineer.net/blog/curve-finance-was-exploited-hackers-steal-over-47m/">Curve Finance (CRV) was exploited. Hackers stole over $47M.</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>Curve Finance</strong> which is one of <a href="https://coinengineer.net/blog/what-are-the-benefits-of-defi/" target="_blank" rel="noopener"><strong>DeFi</strong></a> platforms was attacked by hackers. The assets worth <strong>$24M</strong> were stolen. Here are the details.</p>
<p>Today, Attackers have exploited Curve Finance pools. This situation happened due to <strong>Vyper</strong> compiler had an error caused by 0.2.16, 0.2.15, and 0.3.0 versions. Furthermore, in this attack, the hackers stole <strong>32M </strong>CRV (It is worth <strong>$24</strong> million) from <strong>CRV/ETH</strong> pools. After this attack, Vyper posted a tweet below.</p>
<blockquote class="twitter-tweet" data-width="550" data-dnt="true">
<p lang="en" dir="ltr">PSA: Vyper versions 0.2.15, 0.2.16 and 0.3.0 are vulnerable to malfunctioning reentrancy locks. The investigation is ongoing but any project relying on these versions should immediately reach out to us.</p>
<p>&mdash; Vyper (@vyperlang) <a href="https://twitter.com/vyperlang/status/1685692973051498497?ref_src=twsrc%5Etfw">July 30, 2023</a></p></blockquote>
<p></p>
<p>Besides, If the problem still goes on, all <strong>CRV/WETH</strong> pools might be hacked according to explaining by Vyper. So, this issue can affect all <strong>WETH</strong> pools. However, Curve Finance has announced that other pools are safe. Thus, WETH pools will not have issues because of CRV issues.</p>
<blockquote class="twitter-tweet" data-width="550" data-dnt="true">
<p lang="en" dir="ltr">&quot;All affected pools have been drained or white hacked.</p>
<p>All remaining pools are safe and unaffected by the bug&quot;</p>
<p>Statement from CRV Discord <a href="https://t.co/EvN2hXyB3E">pic.twitter.com/EvN2hXyB3E</a></p>
<p>&mdash; Spreek (@spreekaway) <a href="https://twitter.com/spreekaway/status/1685749072496406529?ref_src=twsrc%5Etfw">July 30, 2023</a></p></blockquote>
<p></p>
<h2>DeFi platforms have been affected due to the Curve Finance issue.</h2>
<p>Many DeFi protocols also faced this issue. <strong>Alchemix</strong> announced that it lost about <strong>5,000 ETH</strong>. According to Alchemix&#8217;s statement, <strong>alETH/ETH</strong> pools have been exploited by a hacker while queuing the transactions.</p>
<p>It is clear that the issues caused by Vyper are just pool issues. Therefore, these attacks will affect just pools. In addition, <strong>CRV Token</strong> price is currently <strong>0.62 </strong>dollars.</p>
<blockquote><p><em><span style="font-size: 115%;">You might like: <span style="text-decoration: underline;"><strong><a href="https://coinengineer.net/blog/sec-and-binance-are-uniting-against-eeons-lawsuit-intervention/" target="_blank" rel="noopener">SEC and Binance are Uniting Against Eeon’s Lawsuit Intervention.</a></strong></span></span></em></p></blockquote>
<h2><span style="font-size: 110%;">Convex Finance has been badly affected</span></h2>
<p>Convex Finance is one of the projects related to Curve. For this reason, <strong>9.24%</strong> of the share Convex is at a loss which is worth <strong>30%</strong>. If this price keeps going down <strong>Convex Finance</strong> might go bankrupt.</p>
<h2><span style="font-size: 120%;">What did the Hacker do after attacking?</span></h2>
<p>CRV tokens are still in the hacker&#8217;s <strong><a href="https://coinengineer.net/blog/?s=wallet" target="_blank" rel="noopener">wallet</a></strong> after the attack. Moreover, some CRV was swapped to <strong>WETH</strong>. Briefly, the hacker&#8217;s wallet includes assets which are worth <strong>$19M</strong>.</p>
<p><img fetchpriority="high" decoding="async" class=" wp-image-2669 aligncenter" src="https://coinengineer.net/blog/wp-content/uploads/2023/07/Curve-Finance.png" alt="Curve Finance" width="652" height="313" srcset="https://coinengineer.net/blog/wp-content/uploads/2023/07/Curve-Finance.png 768w, https://coinengineer.net/blog/wp-content/uploads/2023/07/Curve-Finance-300x144.png 300w" sizes="(max-width: 652px) 100vw, 652px" /></p>
<h5><span style="font-size: 130%;"> Curve Finance Founder&#8217;s position might be liquidated.</span></h5>
<p>The CEO sent his <strong>$300M</strong> CRV token to the <strong>AAVE</strong> platform. After that, he borrowed <strong>$60M. </strong>It is thought that the CEO bought a new house in Australia with this money. Also, If the CEO cannot pay his loan AAVE might face this kind of issue.</p>
<blockquote><p><em><span style="font-size: 115%;">You may also like: <a href="https://coinengineer.net/blog/what-is-smart-contract/" target="_blank" rel="noopener"><span style="text-decoration: underline;"><strong>What Is Smart Contract?</strong></span></a></span></em></p></blockquote>
<p><img decoding="async" class="size-full wp-image-2670 aligncenter" src="https://coinengineer.net/blog/wp-content/uploads/2023/07/Curve-Finance-2.png" alt="Curve Finance 2" width="768" height="400" srcset="https://coinengineer.net/blog/wp-content/uploads/2023/07/Curve-Finance-2.png 768w, https://coinengineer.net/blog/wp-content/uploads/2023/07/Curve-Finance-2-300x156.png 300w" sizes="(max-width: 768px) 100vw, 768px" /></p>
<p>&nbsp;</p>
<p><em>You can type your opinions in the comments. Follow us on <a href="https://t.me/coinengineernews" target="_blank" rel="noreferrer noopener"><strong>Telegram</strong></a> and <strong><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="noreferrer noopener">YouTube</a></strong> for this kind of news.</em></p>
<div class="blog-share text-center"></div>
<div class="blog-share text-center"></div>
<p>The post <a href="https://coinengineer.net/blog/curve-finance-was-exploited-hackers-steal-over-47m/">Curve Finance (CRV) was exploited. Hackers stole over $47M.</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/curve-finance-was-exploited-hackers-steal-over-47m/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2023/07/Curve-Finance-hacked.jpg' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2023/07/Curve-Finance-hacked.jpg' width='58' height='33' /></media:content>	</item>
	</channel>
</rss>
